2012
RN Number | Title | Author 1 | Author 2 | Author 3 | Author 4 | Author 5 | Author 6 |
---|---|---|---|---|---|---|---|
RN/12/01 | Revision Control Database for 3D Assets | Jozef Doboš | Anthony Steed | ||||
RN/12/02 | Dependence for Slicing State-based Models: A Survey | Kelly Androutsopoulos | |||||
RN/12/03 | Evolving Human Competitive Spectra-Based Fault Localisation Techniques | Shin Yoo | |||||
RN/12/04 | Colocation and Latency Optimization | Ayub Hanif | |||||
RN/12/05 | Finance: Communicating the Incommunicable | Ayub Hanif | |||||
RN/12/06 | How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization | Steffen Bartsch | M.Angela Sasse | ||||
RN/12/07 | Initial experiences of the Emerald:E-infrastructure South GPU Supercomputer | W.B. Langdon | |||||
RN/12/08 | Putting Ubiquitous Crowd-sourcing into Context | Afra Mashhadi | Giovanni Quattrone | Licia Capra | |||
RN/12/09 | Genetically Improving 50000 Lines of C++ | WB Langdon | Mark Harman | ||||
RN/12/10 | LOUP: The Principles and Practice of Intra-Domain Route Dissemination | Nikola Gvozdiev | Brad Karp | Mark Handley | |||
RN/12/11 | Correlation of Microarray Probes give Evidence for Mycoplasma Contamination in Human Studies | W.B. Langdon | |||||
RN/12/12 | From Corporate Bully to Security Cheerleader: Transforming the identity of the CISO | Debi Ashenden | M. Angela Sasse | ||||
RN/12/13 | Non-Invasive Autonomous and Amortised Adaptivity Code Injection | Shin Yoo | |||||
RN/12/14 | A Performance Analysis of Distributed Indexing using Terrier | Amaury Couste | Jakub Koz?owski | William Martin | |||
RN/12/15 | Dynamic Learning Gaussian Process Bandits | Diogo Dubart Norinho | |||||
RN/12/16 | Automatic Correction of Topic Coherence | William Martin | John Shawe-Taylor |